botnets
play

BOTNETS GRAD SEC NOV 21 2017 TODAYS PAPERS BOTNETS Collection of - PowerPoint PPT Presentation

BOTNETS GRAD SEC NOV 21 2017 TODAYS PAPERS BOTNETS Collection of compromised machines (bots) under unified control of an attacker (botmaster) Method of compromise decoupled from method of control Launch a worm/virus, etc.:


  1. BOTNETS GRAD SEC NOV 21 2017

  2. TODAY’S PAPERS

  3. BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise decoupled from method of control Launch a worm/virus, etc.: remember, • payload is orthogonal! • Upon infection, a new bot “phones home” to rendezvous with botnet “command-and- control” (C&C) • Botmaster uses C&C to push out commands and updates

  4. BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise decoupled from method of control Launch a worm/virus, etc.: remember, • payload is orthogonal! • Upon infection, a new bot “phones home” to rendezvous with botnet “command-and- control” (C&C) • Botmaster uses C&C to push out commands and updates

  5. BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise decoupled from method of control Launch a worm/virus, etc.: remember, • payload is orthogonal! • Upon infection, a new bot “phones home” to rendezvous with botnet “command-and- C&C control” (C&C) • Botmaster uses C&C to push out commands and updates

  6. BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise decoupled from method of control Launch a worm/virus, etc.: remember, • payload is orthogonal! • Upon infection, a new bot “phones home” to rendezvous with botnet “command-and- C&C control” (C&C) • Botmaster uses C&C to push out commands and updates

  7. BOTNETS • Collection of compromised machines (bots) under unified control of an attacker (botmaster) • Method of compromise decoupled from method of control Launch a worm/virus, etc.: remember, • payload is orthogonal! • Upon infection, a new bot “phones home” to rendezvous with botnet “command-and- C&C control” (C&C) • Botmaster uses C&C to push out Topology can be star (like this), commands and updates hierarchical, peer-to-peer…

  8. TORPIG

  9. DOMAIN FLUXING Domain fluxing: 
 Generate random domain names. 
 How do these bots 
 Move on by the time you’re found know where to go? Issue DNS lookups 
 for a known hostname Provides a level of indirection: 
 Bots know the name ahead of time, 
 but the botmaster can move the C&C 
 node to different IP addresses, as needed Problem: 
 Network operators will simply firewall 
 a known-malicious domain name

  10. YOUR BOTNET IS MY BOTNET Domain fluxing: 
 (This) Botnet takeover: 
 Generate random domain names. 
 Anticipate the domain names; 
 Move on by the time you’re found register those not yet purchased

  11. YOUR BOTNET IS MY BOTNET Domain fluxing: 
 (This) Botnet takeover: 
 Generate random domain names. 
 Anticipate the domain names; 
 Move on by the time you’re found register those not yet purchased ETHICAL CONCERN: DO NO HARM Keep in touch with bots, 
 but never send a new config file Worked with ISPs and law 
 enforcement to take them down

  12. WHAT DID THEY LEARN? 70GB over 10 days

  13. BOTNET SIZE: HOW TO COUNT?

  14. BOTNET SIZE: HOW TO COUNT?

  15. BOTNET SIZE: HOW TO COUNT?

  16. IP ADDRESSES ARE POOR IDENTIFIERS NAT boxes: 
 Small set of public IP addresses (typically one), 
 Large set of private IP addresses (many) Carrier-grade NATs (CGNATS): 
 NATs at a regional/national level 
 A single host can have a different IP address for each connection “The trouble with Tor” 
 Tor exit nodes also NAT 
 Destinations cannot (based on IP addr)distinguish between the exit 
 node’s traffic and Tor clients’ traffic Cloudflare shows Tor users 
 captchas to differentiate

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend